Combining Digital Signature with Local Binary Pattern-Least Significant Bit Steganography Techniques for Securing Medical Images

被引:2
作者
Madhusudhan, K. N. [1 ]
Sakthivel, P. [1 ]
机构
[1] Anna Univ, CEG, Dept ECE, Chennai 25, Tamil Nadu, India
关键词
Watermarking; Digital Signature; Authentication; Security; COMPRESSION;
D O I
10.1166/jmihi.2020.3015
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The image authentication is generally based on two different types of techniques: watermarking and digital signature. In watermarking methods, embedded watermarking is often imperceptible and it contains either a specific ID of producer or codes related to content that are used for authentication. Normally a separate file is stored, digital signature is a non-repudiation and encrypted version of the information extracted from the data. A digital signature can be attached to the data to prove the originality and integrity. The proposed work presents a new approach to steganography of medical images that uses modified Least Significant Bit (LSB) based on the Local Binary Pattern (LBP) pattern. As a first step, cover image has been divided as blocks of 3 x 3 non overlapping masks. Then, the pixel embedding position (clock wise or anti-clock wise) has to be identified using LBP operator. The value of the. LBP operator determines how and where to embed secret image pixel. Later, using LSB method, pixel values will be embedded in the cover image pixel. In order to provide the integrity of the data, the proposed work also presents Reversible Watermarking (RW), a Digital Signature (DS) technique. The proposed algorithm of steganography experimented on few medical images and achieved better efficiency with respect to MSE and PSNR values and same is reported in this paper.
引用
收藏
页码:1288 / 1293
页数:6
相关论文
共 13 条
  • [1] An Effective Arithmetic Combined Digital Signature With Digital Watermarking
    Cheng Xingguo
    [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 831 - 833
  • [2] Chunhua Dong, 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P900
  • [3] Chunxing Wang, 2011, 2011 International Conference on Multimedia Technology, P125
  • [4] Research of Web Resources Protection Based on Digital Watermarking and Digital Signature
    He, Chun
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 294 - 297
  • [5] Kavitha KJ, 2017, 2017 CONFERENCE ON EMERGING DEVICES AND SMART SYSTEMS (ICEDSS), P252, DOI 10.1109/ICEDSS.2017.8073698
  • [6] Kurniawan MT, 2012, 2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), P145, DOI 10.1109/URKE.2012.6319530
  • [7] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [8] Fault resilient and compression tolerant digital signature for image authentication
    Lou, DC
    Liu, JL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 31 - 39
  • [9] Schneider M, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P227, DOI 10.1109/ICIP.1996.560425
  • [10] Shoron S. H., 2018, INT C COMP COMM CHEM, P1